At 12:47 PM -0700 5/26/07, Kyle Hamilton wrote: >On May 26, 2007, at 11:06 AM, Paul Hoffman wrote: > >>If we adopt that model, they can. But, again, that's not what this >>thread was about. It was about Mozilla unilaterally constraining the >>names without asking the user based on a feature of the audit. > >...versus an "all-or-nothing" trust?
Correct: that is what we have now. FWIW, it is what essentially all software that uses certificates for identification have. >The security experts which make the decisions for Mozilla work for >Mozilla. I'm not entirely certain there's a statement of crypto >team guiding principles anywhere, but I think this is fairly >common-sense: > >1) They must make the best judgement for individual user security >that they can, >2) in a fashion that is non-judgemental against potential trust anchors, >3) while reducing market-share attrition based on security >capabilities versus incapabilities. > >MoFo already has a statement on what a CA must do in order to be >admitted to the distributed trust anchors. The problem comes when >MoFo can't verify claims of audit compliance. We disagree about the problem. To me, the problem is that, even if we could constantly audit the security of a trust anchor's certificate issuance configuration, we can never adequately audit the methods they use to bind an identity with a particular private key. The current thread is about a proposal that says, in essence, "we are willing to accept a secret audit of a trust anchor that we cannot see from a national government security agency, but if we accept that, the trust anchor can only bind identities that contain a domain name in that nation's TLD; trust anchors with non-secret audits can bind any type of identity". To me, the first part is too much of a leap. I agree with others who say "no secret audits", and the corollary to that is that all trust anchors can bind any type of identity. >If there's a governmental entity running it, then that government >has the right to say what is correct within its own country -- the >'government' is the entity in which all trust is placed, and the >authority from which the right of audit is derived. This has at least two significant problems. - Without seeing the audit, we have no idea whether the security used by the agency would pass muster for the identities being bound. This means that the standards we hold VeriSign to for certificates whose identities are in .kr different than the standards we hold KISA to. When the user goes to foo.kr, they can't tell what level of security Mozilla chose for the certifier. - There are plenty of companies in Korea that are identified by domain names outside of the .kr TLD. It is incredibly inconsistent for us to say "we trust you for identities in this TLD but not that one" when what little we know about their audit has absolutely nothing to do with their ability to discern between companies using one TLD versus another TLD. >(Without governmental structure, there is no accountability, and >without accountability, there's no reason to trust any claimed >audit.) Fully agree. >The question outstanding is thus "does the governmental CA have any >provision for attempting to certify entities outside of its borders?" We have no way of knowing that with a secret audit. >If no, then the way to describe the limitation would be in the >Subject's "C" field ("C=FR"). This sounds unwise. If the CIA equavlent in the Democratic Republic of Somewhere do a secret audit of the DRS NIST, we will allow DRS NIST to issue certs with a subject of "CN=Our Local Mafia; C=DRS" and a subjectAltName of "dnsName=www.ebay.com". >If yes, then this entire discussion becomes moot. > >(Of course, the way X.509 was originally defined in the first place >was that each country would get a CA certificate derived from the >single, global trust anchor.) And that worked ever so well... _______________________________________________ dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto